Question

QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who...

QUESTION 2

  1. Ensuring that data is genuine, meaning that the sender of the data is who they say they are, that the data received is the data that the sender meant to send, and that the receiver is who they say they are

    a.

    confidentiality

    b.

    authentication

    c.

    non-repudiation

    d.

    integrity

2 points   

QUESTION 3

  1. Cryptography method that uses a single key for both encryption and decryption

    a. prime factorization
    b. asymmetric
    c. symmetric
    d. message authentication code

2 points   

QUESTION 4

  1. Algorithm for key exchange, allows two users to exchange information and use that information to generate a shared, secret key that is never actually transmitted; used by the Internet Key Exchange (IKE) protocol

2 points   

QUESTION 5

  1. Result of hashing a message and a shared secret, H(m+s), helps to provide message integrity

2 points   

QUESTION 6

  1. A cryptographic technique that allows the creator of a message to prove that they created it, helps to provide authentication, uses public key encryption

2 points   

QUESTION 7

  1. Organization that assumes the responsibility for validating identities and certifying public keys

2 points   

QUESTION 8

  1. Attack in which falsified DNS replies are sent. An attacker hears a DNS request and then sends DNS replies with bogus A and sometimes NS resource records that are then cached by the requester.

2 points   

QUESTION 9

  1. Technique used to find computers that are running a vulnerable application and listening for connections on a particular port. Can also be used to determine all of the ports that a computer is listening on.

2 points   

QUESTION 10

  1. In this attack, the attacker will send many TCP SYN packets, but never complete the handshake (by responding to the receiver’s SYN/ACK). This leaves many “half-open” connections on the receiver and can use up all of the receiver’s resources. Legitimate connections will then not be able to be handled.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answers:

2. Integrity

Integrity means that the data which is send by the Sender to the receiver has not been modified or altered in the transit of the data.

3. Symmetric

In Symmetric key cryptography method same key is used for encryption and decryption of the message.

4. DiffieHellman key exchange algorithm

DiffieHellman key exchange algorithm is being used by the Internet Key Exchange(IKE) protocol for exchanging the key.

5. TRUE

Hashing a message always provides the better integrity of messages than any other methods.

Note: As per Chegg policy only 4 can be answered in a single post,will post remaining answers in next post.

Add a comment
Know the answer?
Add Answer to:
QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks...

    1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks security literature. (3 Points) (b) Lorenzo likes to send to his close friend Art a secret market data related to their business using public key cryptography (RSA algorithm). He chooses two prime numbers 7 and 11, and a public key e = 13 to encrypt the data. Art uses d=37 to decrypt the data. Indicate why (e, 77) and (d, 77) are valid public...

  • need help with embedded systems question: QUESTION 1 If a system's data/code is modified by an...

    need help with embedded systems question: QUESTION 1 If a system's data/code is modified by an attacker, which of the following security attributes is violated? o confidentiality O integrity O availability O authenticity QUESTION 2 Copy of If secret data of a system is leaked by an attacker, which of the following security attributes is violated? O confidentiality O integrity O availability O authenticity We were unable to transcribe this imageQUESTION 5 In the previous question, suppose that Alice also...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols...

    The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols such as IPSec for communicating parties to agree on a shared key. The DH algorithm makes use of a large prime number p and another large number, g that is less than p. Both p and g are made public (so that an attacker would know them). In DH, Alice and Bob each independently choose secret keys, ?? and ??, respectively. Alice then computes...

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q =...

    Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q = 1 5 7 and a primitive root a = 5. a. If Alice has a private key XA = 15, find her public key YA. b. If Bob has a private key XB = 27, find his public key YB. c. What is the shared secret key between Alice and Bob? Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common...

  • Part 1: True and False Questions. Write your answer, “T” or “F”, to each question in...

    Part 1: True and False Questions. Write your answer, “T” or “F”, to each question in the following Answer Table. (10 questions at 2 points each, 20 points totally) 1. A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses. 2. The biggest advantage of public-key cryptography over secret-key cryptography is in the area of key management/key distribution. 3. Packet filters protect networks by blocking packets based on the packets’ contents. 4. Intrusion Detection Systems (IDS)...

  • (7) (2 pts) The simplified version of the handshaking procedure between a client and a bank...

    (7) (2 pts) The simplified version of the handshaking procedure between a client and a bank server for establishing a secure connection is described below (just consider it identical to the SSL/TLS described in class): 1. A client connects to the TLS-enabled bank server requesting a secure connection, and presents a list of supported ciphers (RC4, DES, AES, etc) and hash functions (MD5, SHA-1, etc). 2. The server picks the strongest cipher and hash. It then server sends back its...

  • Subject. Internet & web design technology I need the questions number. 27, 28, 29,30,35,,37,39 , 40,43,45,49,50...

    Subject. Internet & web design technology I need the questions number. 27, 28, 29,30,35,,37,39 , 40,43,45,49,50 Please send me the correct answer The last page have 43,45,49,50 We were unable to transcribe this imageprotocol (32) t an application attempts to send a UDP do? message that exceeds the Maximum Transmission Unit (MTU), what will the Ip d) compress it le) expand MTU (b) truncate it (c) fragment n (a) reject it (33] Which is not true of the Transmission Controil...

  • PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the...

    PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the Go-Back-N and Selective repeat protocols, what does the window value signify? The packets that have already been ACKed The packets sent but remain unACKed The sequence numbers available and not yet sent The sequence numbers of packets not yet available None of the above 1 points    QUESTION 2 Which of the following is NOT a component of the TCP congestion control algorithm? Slow...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT